Physics – Quantum Physics
Scientific paper
2009-01-22
Proc. of ICQNM 2009 (IEEE, Los Alamitos, California, 2009), pp. 38-41
Physics
Quantum Physics
Proceeding of ICQNM 2009, The Third International Conference on Quantum, Nano and Micro Technologies, Cancun, Mexico, 1-7 Febr
Scientific paper
10.1109/ICQNM.2009.8
We consider one of the quantum key distribution protocols recently introduced in Ref. [Pirandola et al., Nature Physics 4, 726 (2008)]. This protocol consists in a two-way quantum communication between Alice and Bob, where Alice encodes secret information via a random phase-space displacement of a coherent state. In particular, we study its security against a specific class of individual attacks which are based on combinations of Gaussian quantum cloning machines.
Braunstein Samuel L.
Lloyd Seth
Mancini Stefano
Pirandola Stefano
No associations
LandOfFree
Eavesdropping of two-way coherent-state quantum cryptography via Gaussian quantum cloning machines does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Eavesdropping of two-way coherent-state quantum cryptography via Gaussian quantum cloning machines, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Eavesdropping of two-way coherent-state quantum cryptography via Gaussian quantum cloning machines will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-65363